Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 23:00
Static task
static1
Behavioral task
behavioral1
Sample
Loader.bin.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Loader.bin.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Loader.bin.exe
-
Size
6KB
-
MD5
5c3b3d29900401cf7c8a6f7da0a1d7fa
-
SHA1
41cf781fed46bf34cbec0a2852c56592297cc7ed
-
SHA256
fc4590965f4831e8ed0e8465df39ca064d14dfcb79f320bf937ba18807d08f2c
-
SHA512
ddec58841d1b8c9278802ae310701c89eaf6cf306d21cd0af1b913e54ea524438799c1038f5a3c2b2288b770b46fad785331798b7ee826fb30e5e65965bdceca
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dw20.exepid process 3276 dw20.exe 3276 dw20.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Loader.bin.exedw20.exedescription pid process Token: SeDebugPrivilege 4060 Loader.bin.exe Token: SeRestorePrivilege 3276 dw20.exe Token: SeBackupPrivilege 3276 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Loader.bin.exedescription pid process target process PID 4060 wrote to memory of 3276 4060 Loader.bin.exe dw20.exe PID 4060 wrote to memory of 3276 4060 Loader.bin.exe dw20.exe PID 4060 wrote to memory of 3276 4060 Loader.bin.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.bin.exe"C:\Users\Admin\AppData\Local\Temp\Loader.bin.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15842⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-